Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 06 Issue 85

  

Computer underground Digest Wed Sep 28, 1994 Volume 6 : Issue 85
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Urban Legend Editor: E. Greg Shrdlugold

CONTENTS, #6.85 (Wed, Sep 28, 1994)

File 1--"Green Card Lawyers" Threaten T-Shirt Maker
File 2--ACLU letter and release on FBI Wiretap bill
File 3--Internet Security Seminar (Nov 12 '94)
File 4--Police, Press, and Porn in Toronto
File 5--Canadian BBS Sysops Plead Guilty to "Piracy"
File 6--PHRACK hardcopies available from SotMESC / GCMS
File 7--ACLU Gopher
File 8--Telecommunication Reform Bill (S. 1822) DEAD!
File 9--Cu Digest Header Information (unchanged)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Tue, 20 Sep 1994 16:42:43 -0400
From: eye@IO.ORG(eye WEEKLY)
Subject: File 1--"Green Card Lawyers" Threaten T-Shirt Maker


Toronto's arts newspaper .....free every Thursday
===================
EYE NET EYE NET

ALL HAIL THE CHIC GEEK!
Scum-sucking weasel lawyers as fashion statements

by
K.K. CAMPBELL


Coupla weeks ago, eye Net reported how North Carolina university
student Joel Furr (jfurr@acpub.duke.edu) designed a popular
collectible -- T-shirts about net.poltergeist "Serdar Argic." Furr
promised to follow-up with a T-shirt featuring Arizona lawyers
Laurence Canter and Martha Siegel.

On June 18, eye Net reported how this wife-and-hubby law team sent
an ad for the American "Green Card lottery" to thousands of
newsgroups (win a work permit raffle run by the U.S. government;
C&S offered to fill in a few forms for merely hundreds of dollars).
This posting tactic is called "spamming." C&S did it twice.

Spammers are loathed. Commercial spammers are loathed more.
Snotty lawyer commercial spammers attain monumental loathing. So
'twas no surprise C&S were mailbombed into oblivion after each
spam attack against Usenet. Both times, the lawyer's Internet
providers terminated their account after a global deluge of
complaints.

The legal weasels squealed in anger and threatened to sue their
Internet providers. But nothing came of it.

Now they've threatened to sue Furr over his little non-profit T-shirt
featuring the net.vermin. Shirt design features a four-color logo of a
hand clutching a green card bursting forth from a globe. Around it:
"The Green Card Lawyers -- Spamming the Globe."

On Aug. 8, Furr publicly announced C&S had sent him private email, a
standard nasty-lawyer letter. C&S asserted the "use of their names,
likenesses or nickname is prohibited" -- meaning he couldn't even
call them, "The Green Card Lawyers." Furthermore, Furr was
informed "several large companies" had contacted the lawyers about
a line of C&S T-shirts and Furr's plan to sell maybe 10 dozen shirts
"would hurt their marketability."

A clarification: Furr's shirt mocks C&S -- who the hell would wear
it, let alone buy it, otherwise? The claim that "several large
companies" are considering issuing a friendly C&S shirt is a source
of much mirth and merriment about Planet Earth.

Furr knew C&S was fullashit -- indeed, most of Usenet-reading
Planet Earth is sure they're fullashit -- but, being a student, he
knew he'd neither the time nor resources to fight a nuisance suit.
Thus he concluded his Aug. 8 public post: "I think I have lots and lots
of legal legs to stand on, but I can't afford to fight a lawsuit." The
term "Green Card Lawyers" would be removed from the shirt.

But Furr's mailbox soon brimmed with offers of legal assistance,
even monetary help -- anything to thwart the most hated husband-
wife team in Usenet history. (And Canter has said several times he's
going to write a book about how to advertise on the net!)

Electronic Frontier Foundation's chief legal counsel Mike Godwin
(mnemonic@eff.org) advised Furr C&S "threats" were impotent bluster,
Furr told eye in a telephone interview, because 1) C&S are not members
of the Arizona bar; 2) they are under investigation by the Tennessee
bar; 3) they can sue only in the state in which Furr does business; and
4) they have no trademark over the term "Green Card Lawyers."

This last means that just because Usenetters call C&S the "Green
Card Lawyers" doesn't grant them a trademark on the term. For
instance, eye calls them the "Two-Bit, Suck-My-Left-Nut Lawyers"
-- Martha and Larry don't own that name either.

Bottomline: Furr's going ahead with the original design.

"Green Card Lawyers" T-shirts are $11 U.S. -- XXL $1 more, XXXL $2
more. Canadians add $1. Write Furr for more details. To join the
net.collectibles mailing list, send email with the message
"subscribe netstuff" (without the quotes) to
majordomo@acpub.duke.edu . For the latest on the net.vermin, read
alt.flame.canter-and-siegel .

===========
Retransmit freely in cyberspace Author holds standard copyright
Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
Mailing list available http://www.io.org/eye

------------------------------

Date: Mon, 26 Sep 1994 17:57:50 -0400
From: ACLU Information <infoaclu@ACLU.ORG>
Subject: File 2--ACLU letter and release on FBI Wiretap bill

ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU
NEWS RELEASE * NEWS RELEASE * NEWS RELEASE * NEWS RELEASE

ACLU Opposes FBI Wiretap Access Bill;
Legislation Would Create Dangerous Precedent

For IMMEDIATE RELEASE
September 26, 1994

Contact: Barry Steinhardt
BarryS @ aclu.org
or Kathy Parrent, 212-944-9800, ext. 424


The American Civil Liberties Union today called on the House
Judiciary Committee to reject the FBI Wiretap Access Bill, H.R. 4922,
which would require private electronics manufacturers to insure that the
FBI can wiretap using developing telecommunications technologies.

In a letter sent to Congressman Jack Brooks, Chair of the House
Judiciary Committee, the ACLU stated that the bill "... creates a
dangerous and unprecedented presumption that government not only has the
power, subject to warrant to intercept private communications, but that it
can require private parties to create special access. It is as if the
government had required all builders to construct new housing with an
internal surveillance camera for government use."

"Moreover, the FBI has not borne the burden of proving why such an
extraordinary requirement is necessary..." the letter said.

A copy of the full letter with the ACLU's detailed objections
follows.
___________________________________________________________________________

September 22, 1994




Honorable Jack Brooks
Congressman, State of Texas
2449 Rayburn House Office Building
Washington, D.C. 20515-4309

Dear Congressman Brooks:

We are writing to you to express the ACLU's opposition to the
FBI-Wiretap Access Bill, H.R. 4922. While we were not actively involved
in Subcommittee deliberations, we have reviewed the legislation and we
have several major concerns.

The principal problem remains that any digital telephone bill
which mandates that communications providers make technological changes
for the sole purpose of making their systems wiretap-ready creates a
dangerous and unprecedented presumption that government not only has the
power, subject to warrant, to intercept private communications, but that
it can require private parties to create special access. It is as if the
government had required all builders to construct new housing with an
internal surveillance camera for government use. Even if such use were
triggered only by a judicial warrant, such a requirement would be strongly
resisted by the American people. H.R. 4922 establishes a similar
requirement, and is without precedent.

Moreover, the FBI has not borne the burden of proving why such an
extraordinary requirement is necessary. In 1993, there were fewer than
1,000 wiretaps authorized and many of them failed to yield any substantive
evidence while intercepting many innocent conversations. It is far from
clear that digital telephones will substantially obstruct legitimate law
enforcement efforts. Without further public discussion and debate, the
public will not have a sufficient opportunity to weigh the loss of privacy
against the FBI's claims. There has been no opportunity to learn the full
extent of the types of investigations that the FBI claims were precluded
because of a restriction on their public dissemination. Yet, based on
these secret assertions, 91 such incidents were cited by the FBI. On
those slim assertions, the public's loss of privacy in digital
communications is all but assured and taxpayers will be asked to pay an
extraordinary price.

H.R. 4922 authorizes $500 million over the next four years to
reimburse telecommunications carriers for the costs that would be imposed
by the bill. Even if you accept these cost estimates -- the industry puts
the real cost in the billions -- we will spending $125 million or $125,000
per wiretap, for the fewer than 1,000 taps that will be conducted each
year.

As you know, the ACLU has the greatest respect for Congressman
Edwards and Senator Leahy. Both have been tireless champions for civil
liberties. The Edwards/Leahy proposal is an improvement over earlier
versions offered by the FBI and we applaud their efforts to add new
privacy protections.

The proposed expansion of the Electronic Communications Privacy
Act to cordless phones and the requirement that a court order be obtained
for transactional data from electronic communication providers both are
steps forward and merit separate consideration by the Congress. But they
cannot and should not be traded for the unprecedented intrusion
represented by H.R. 4922.

In several respects, H.R. 4922 is still too broad in its
application.

For example, earlier versions of the bill would have applied
directly to on-line communication and information services such as
internet providers, America On Line, Compuserve, Prodigy etc. H.R. 4922
would apply directly only to "telecommunications carriers" such as the
Regional Bell Operating Companies.

But this provision does not narrow the scope of the bill as much
as it might seem. First, with the new presumption that the government is
entitled to require private manufacturers to insure its ability to
wiretap, law enforcement will undoubtedly be back in future years
insisting that this limitation thwarts its efforts and will seek to
broaden the coverage to other information providers. Once the basic
principle of H.R. 4922 is accepted, what arguments remain to resist its
expansion. The limited application of H.R. 4922 is surely temporary; what
matters is the basic requirement, not its immediate application.

More importantly, law enforcement will still have the opportunity
to intercept on-line communications over the internet or commercial
on-line networks, by tapping into the facilities of the telecommunications
companies. As critics of the earlier versions had noted the coverage of
the on-line providers was largely redundant. All these communications
still pass over telephone lines.

Law enforcement does not need access at every point in a
telecommunication in order to intercept it. Access at any one point is
sufficient and that would be readily available since ultimately on-line
communications must travel over the public switched telephone network
which the bill requires be wiretap ready.

Moreover, given the commingled nature of digital communication
lines, it is inevitable that more private information from third parties
will be intercepted than would be the case with analog phones, and the
minimization requirements in the bill will not prevent this.

In the end, this proposal will make our telecommunications
structure more, not less vulnerable.

In its original form the FBI Digital Telephony proposal would have
given the power to the Attorney General to impose standards on
communication providers which would guarantee that their systems were
wiretap-ready.

Essentially, this would have created a centralized wiretapping
system that threatened the privacy of the entire nation and was dependent
for its security on a few select people.

This raised the real concern that if electronic communications
service providers must design their systems to allow and ensure FBI
access, then the resulting mandatory "back doors" may become known to and
be exploited by "criminals."

The new proposal contains the same risks. It would have the
technical standards developed by the industry, through trade associations
or standard-setting bodies, in consultation with the Attorney General.
But it contains a "safe harbor" provision, which protects a carrier from
sanction if it is in compliance with standards created by this approach.

The safe harbor provision virtually guarantees that the standards
developed through the industry-based process will be adopted by all.
Whether the standards are directly imposed by government or created by
concerted industry action, in consultation with the government, makes
little difference. The result is the same. A centralized wiretapping
capacity with all of its vulnerabilities will still be created.

Finally, we have grave concerns about the encryption provisions.
The Edwards/Leahy version has been described as "neutral" on encryption.
The bill provides that telecommunications providers do not need to decrypt
data, unless they hold the key.

In the short term, this is an improvement over the earlier
versions of the bill which would have created obligations to decrypt, but
there are at least two longer term problems.

First, is the new presumption that industry has the affirmative
responsibility to create special technical capacity for the government to
snoop. Can there be any real doubt that the FBI will be back in the years
to come asserting that its ability to intercept communications has been
thwarted by easily available encryption and that an industry obligation,
analogous to the new obligation to provide wiretap capacity, must be
created.

Secondly, in some cases the telecommunications providers may well
hold the key -- particularly as they expand the services they provide to
their customers.

H.R. 4922 proposes a radical and expensive change in our
telecommunications structure. The threats it poses, now and
prospectively, are real, but the need for it far less than evident or
proven. We urge that your Committee not rush into consideration of this
far reaching measure with so little time left in the session.

We thank you for your consideration of our views and we would be
happy to sit down with you to discuss these issues.

Sincerely,

Ira Glasser Laura Murphy Lee

=====================

The ACLU urges interested persons to contact the following members of
Congress immediately:

Rep. Jack BrooksSen. Howard Metzenbaum
(202) 225-6565 (voice)(202) 224-7494 (voice)
(202) 225-1584 (fax)(202) 224-5474 (fax)

=============================================================

ACLU Free Reading Room | American Civil Liberties Union
gopher://aclu.org:6601 | 132 W. 43rd Street, NY, NY 10036
mailto:infoaclu@aclu.org| "Eternal vigilance is the
ftp://aclu.org | price of liberty"

------------------------------

Date: Thu, 22 Sep 1994 08:35:44 GMT
From: voidstar@NETCOM.COM(Scott Corcoran)
Subject: File 3--Internet Security Seminar (Nov 12 '94)

INTERNET SECURITY
SECURE COMMUNICATIONS OVER UNTRUSTED NETWORKS

A one-day seminar on November 12, 1994
Embarcadero Hyatt Regency Hotel in San Francisco.


Methods of achieving authentication, authorization,
confidentiality, integrity, and nonrepudiation are key to the
successful realization of the National Information
Infrastructure (NII). Today's Internet is a proving ground for
what will become the NII.

The San Francisco Chapter of the IEEE Computer Society has put
together an outstanding program on encryption, intrusion
detection, firewalls, architectures, and protocols for Internet
Security. Speakers in this seminar will describe several of
the main techniques that exist today and the directions in
which they are evolving. The seminar will be helpful to
engineers, engineering managers and product planners seeking
current knowledge of Internet Security.


PROGRAM

8:30 a.m. Registration opens

9:00 a.m. Introduction

9:05 a.m. Keynote Address James Bidzos, President of RSA

9:45 a.m. Steven Bellovin, Ph.D., Bell Labs
"Firewalls for Computer Security"

11:00 a.m. Teresa Lunt, SRI
"Intrusion Detection"

11:45 a.m. Round Table Lunch (incl. with registration)

1:00 p.m. Professor Martin E. Hellman, Ph.D., Stanford
"Cryptography: The Foundation of Secure Networks"

2:00 p.m. Dan Nessett, Ph.D.,
SunSoft and PSRG
"Future Internet Security Architecture"

3:00 p.m. Matt Blaze, Ph.D., Bell Labs
"Protocols: Security Without Firewalls"

4:00 p.m. "Public Safety vs. Private Liberty"
A Panel Discussion on the Social
Implications of Internet Security
Rex Buddenberg NPS
Alan McDonald FBI
Stewart Baker formerly of the NSA
James Bidzos President of RSA
Matt Blaze Bell Labs
Martin Hellman Stanford


A one day seminar in San Francisco, on Saturday, November 12th,
covering private and public-key encryption, key-escrow,
fire-walls, architecture and protocols for security,
intrustion detection, and a spirited panel discussion on
"Public Safety vs. Private Liberty" !

SEATING IS LIMITED. PRE-REGISTER BY OCTOBER 15TH.


9:05 Keynote Address

James Bidzos, President of RSA

James Bidzos, President of RSA Data Security, will present the
keynote address. Mr. Bidzos heads a company whose encryption
technologies are licensed for products ranging from computer
operating systems, to software copy protection, to electronic
mail, to secure telephones. RSA has licensed several million
copies of its encryption software, and has become a focal point
for debate on appropriate application of cryptography.

Mr. Bidzos has gained a unique perspective on the requirements
of effective cryptographic systems. He will highlight the
problem of providing strong encryption for users of computer
networks while meeting the legitimate needs of law enforcement


9:45 Steven Bellovin, Ph.D., Bell Labs
"Firewalls for Computer Security"

When you connect your computer to the Internet, you also create
a channel into your computer. Clever vandals, thieves and
industrial spies have found ways to abuse most of the Internet
protocols from FTP and Telnet to the World Wide Web and
Network Time Protocols. Short of pulling the plug, firewalls
provide the surest defense. The firewall administrator must
keep abreast of new methods of attack and understand how
firewalls can mitigate the threat. Steven M. Bellovin, Ph.D.,
is a senior researcher at AT&T's Bell Laboratories and
co-author of the well known guide "Firewalls and Internet
Security: Repelling the Wily Hacker." As one responsible for
protecting "the phone company" from Internet hackers, Dr. Bellovin
can describe from firsthand experience how firewalls can be
constructed to screen them out. Dr. Bellovin will join us in a
live video teleconference from Bell Laboratories.

11:00 Teresa Lunt, SRI "Intrusion Detection"

Inevitably, someone will try to breach your firewall and might
succeed. The time it takes you to discover the intrusion and
catch the culprit depends on the event logging you have
established. However, logging the many different transactions
that might expose trespassing produces mountains of data.
Automatic digestion of the logs is the only hope of monitoring
them all. Teresa F. Lunt, Director of Secure Systems Research
at SRI's Computer Systems Laboratory, directs work in
multilevel database systems and intrusion detection. Ms. Lunt
will describe intrusion detection and demonstrate automated
tools developed at SRI to analyze audit data for suspicious
behavior.

1:00 Professor Martin E. Hellman, Ph.D., Stanford
"Cryptography: The Foundation of Secure Networks"

Data in transit across unsecured networks like the Internet
are subject to wiretapping attacks and impersonation.
Moreover, privacy of communication and authentication of the
sender's message are essential to Internet commerce, with
exchange of contracts, receipts, credit card drafts and the
like increasingly commonplace. Encryption can solve some of
these problems, but what kind of encryption? Authentication
only or encrypted messages? Secret key or public key, or
both? Will you need a giant key ring for mes sage keys,
session keys, file keys, and passwords? Martin E. Hellman,
Ph.D., Professor of Electrical Engineering at Stanford
University, is co-inventor of public key cryptography with
Whitfield Diffie and Ralph Merkle. He was elected a Fellow of
the IEEE for contributions to cryptography. Dr. Hellman will
explore threats to communication and costs of electronic
countermeasures. He will explain the importance and means of
authenticating electronic messages, and he will survey public key
cryptography. Dr. Hellman will describe public key techniques
including Rivest-Shamir-Adleman (RSA), Diffie-Hellman, ElGamal
and Digital Signature Standard (DSS). He will also describe
the current status of export control and encryption standards
such as the Data Encryption Standard (DES), Escrowed
Encryption Standard (EES) and its encryption algorithm,
Skipjack, which is implemented in Clipper and Capstone chips.

2:00 Dan Nessett, Ph.D., SunSoft and PSRG
"Future Internet Security Architecture"

Dan Nessett, Ph.D., of the SunSoft Division of Sun
Microsystems, and until recently with Lawrence Livermore
National Laboratory, has worked extensively in local area
networks, distributed operating systems and distributed systems
security. He is a member of the Privacy and Security Research
Group (PSRG), which is convened under the auspices of the
Internet Society. Dr. Nessett will explain the emerging
Internet security architecture work undertaken by the PSRG.
The architecture will guide the development of security
mechanisms used in Internet standards.


3:00 Matt Blaze, Ph.D., Bell Labs
"Protocols: Security Without Firewalls"

We use firewalls because Internet protocols are not inherently
secure. Can we rehabilitate the Internet protocols to produce
protocols which are secure, not computationally prohibitive,
and compatible with existing protocols? Matt Blaze, Ph.D., of
Bell Laboratories will talk about the problems of integrating
cryptographic protection into large-scale network infrastructure.
Dr. Blaze is the author of "A Cryptographic
File System for Unix," presented at the 1993 ACM Conference on
Communications and Computer Security, and co-author with John
Ioann idis of "The Architecture and Implementation of
Network-Layer Security Under UNIX," which describes "swIPe," a
network-layer security protocol for the IP protocol suite.
Dr. Blaze will address issues concerning network security
protoc ols, key management and distribution, and threats and
models for cryptographic engineering.

4:00 A Panel Discussion on the Social Implications of
Internet Security "Public Safety vs. Private Liberty"

At one end of an imagined security spectrum lies the
information police-state. Through traffic analysis,
mandatory personal ID numbers and escrowed encryption, and
the ability to record all messages and commerce carried out
on the Information Superhighway, governments could maintain
dossiers on every aspect of the personal life and business
of its citizens. Privacy advocates fear that a corrupt government
could use such information against its political enemies and to
subvert personal freedoms. At the other extreme lies information
anarchy. Through the use of digital cash, anonymous remailers,
and strong non-escrowed encryption, the Information
Superhighway could become a hide-out for criminals and
national security threats. The potential for black-market
activity and the associated tax-evasion is so enormous that
some have speculated that governments could eventually
collapse. Law-enforcem ent advocates fear that they will be
unable to keep up with criminals and terrorists who ply their
trade electronically. Our distinguished panel will provide
insight into the interplay between the rights of individuals
to privacy and freedom, the rights of companies to conduct
unrestrained trade, and the ability of law enforcement and
security agencies to perform their functions efficiently.
This conclusion to the seminar will put into perspective
the social changes that might be wrought by the technical
advances discussed earlier in the day.

Panelists include:

Rex Buddenberg NPS
Alan McDonald FBI
Stewart Baker formerly of the NSA
James Bidzos President of RSA
Matt Blaze Bell Labs
Martin Hellman Stanford

Rex Buddenberg, Instructor of information systems architecture
and applied networking at the Naval Postgraduate School, will
moderate the panel. Mr. Buddenberg is a maritime command,
communication, control and intelligence (C3I) consultant and a
computer networking author. As a C3I architect for the U.S.
Coast Guard, he developed plans and specifications for
extending Internet connectivity to oceanographic ships. Mr.
Buddenberg contemplates the means and effects of net warfare as
both the good guys and bad guys share the same network.

Alan McDonald, Special Counsel for Electronic Surveillance Matters,
Information Resources Division, Federal Bureau of Investigation,
is a specialist in the law and policy concerning electronic
surveillance, Digital Telephony, and encryption issues.
He frequently represents the FBI's view of law enforcement equities
in light of advanced telecommunications and encryption.

Stewart Baker is a former General Counsel to the NSA and
a partner in Steptoe & Johnson, a Washington, DC law firm.
His expertise is in telecommunications, computer export policy,
security of national information infrastructure and encryption.
Mr. Baker brings direct experience with the problem that strong
encryption creates for the NSA in protecting our national
security.


QUESTIONS? CALL (415)-327-6622.

Cut-off and complete this form, enclose your check payable to
the IEEE SFCS, and mail to: IEEE Council Office 701 Welch
Rd. #2205 Palo Alto, CA. 94304

To qualify for the reduced Pre-registration fees, your
application with check must be postmarked no later than Oct.
15, 1994. Registration fee includes lunch, refreshments, and
parking. Seating is limited. To make sure the seminar is
not sold out, call (415) 327-6622.

please check the appropriate box

Fees on or before Oct. 15th:

___ IEEE Member $ 110
___ Non-member $ 120
___ Student $ 85

Fees after Oct. 15th:
___ IEEE Member $ 125
___ Non-member $ 145
___ Student $ 100 (students must present ID)


The seminar location is the Hyatt Regency Embarcadero Hotel,
near the Ferry Building, in San Francisco.
Your registration fee includes the all day seminar, lunch,
and convenient parking in the garages underneath adjacent
Embarcadero Centers 1, 2, or 3. (Keep your ticket for validation).


Please print clearly:

Name : __________________________________________

Title : __________________________________________

Company: __________________________________________

Address: __________________________________________

__________________________________________

_______________________________ ___ ______

Day phone #:(___)_____-_______

IEEE member (or affiliate) #:_______ ____ (for discount)

College/University (if student):___________________

___ Vegetarian lunch option


Refunds will be honored through October 22nd, substitutions
any time. Additional information can be obtained by telephoning
the IEEE Bay Area Council Office: (415)327-6622.

IEEE SFCS RESERVES THE RIGHT TO MAKE CHANGES TO THE SEMINAR

Sponsored by the San Francisco Chapter of the IEEE Computer
Society. The IEEE is a non-profit organization.

------------------------------

Date: Sun, 25 Sep 1994 20:28:58 -0400
From: eye@IO.ORG(eye WEEKLY)
Subject: File 4--Police, Press, and Porn in Toronto


~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eye WEEKLY September 22 1994
Toronto's arts newspaper .....free every Thursday
~~~~~~~~~~~~~~~~~~~~~~~~~~~
EYE NET EYE NET

PRESS, POLICE AND PORN REVISITED

by
K.K. CAMPBELL


Once again, the news media finds itself being used to misrepresent
the nature of the net for the Big Story about the 3Ps -- Pedophilia,
Pornography or Piracy.

On Sept. 13, CITY-TV's CityPulse News did a story about "Mr.
Concerned Citizen," who is worried children can access hardcore
porn on the net through a system called called Interlog. Mr.
Concerned Citizen is Bruce Lloyd of Agincourt, who filed a complaint
with Metro Police Chief William McCormack against Interlog.

We also met Interlog owner Matt Harrop (mharrop@interlog.com), a
19-year-old with dyed-purple hair. It's the sort of juxtaposition of
images that the camera loves: Mr. Concerned-Citizen-Who-Loves-
Children versus Freaky-Haired Porn-Peddler.

But that's not quite the whole story.

It turns out Lloyd is himself a writer of copious vile material. Lloyd
had not counted on some elements of the news media discovering his
net.history. (Joe Baptista, a friend of Lloyd's, similarly suckered
CITY news in January with the fake story that the Ontario
government computers held banned Karla Homolka newstories in
them.)

In fact, as this column will demonstrate, Lloyd's complaint issues
from a personal vendetta against Harrop.

Sysadmins, take note.

LLOYD IN ACTION

Let's review some of Lloyd's posting habits. It all seems to have
started around Aug. 21, when Lloyd entered into a flamewar with
rabid homophobe Chuck Whealton (chuck@hopi.dtcc.edu).

* Lloyd began mailbombing Whealton's site, a definite no-no.

* Lloyd soon claimed he'd found out where Whealton lives and that he
and friends would drive down to Delaware and gang rape Whealton: "I
can't wait to have sex with him ... maybe we could do it at the same
time! I bet he's never had two guys up his ass at once before!"

* Lloyd has the curious distinction of being even more hated by most
online gays than brain-dead homophobes like Whealton. Quotes from
his public posts afford a glimpse into why. Lloyd wrote some
interesting posts to lesbian netters: "You just can't leave me alone
... Enjoy being a failure, Cuntlicker." "Perchance a rigorous butt-fuck
is what you need to loosen up, Cuntrag?"

In a phone interview, Lloyd admitted to eye he wrote these remarks
-- in fact, he giggled when admitting to them. "Well, you know, I
was trying to be insulting."

* His interest in protecting children from porn is also clear from
this Usenet post: "I love straight fuckers like this. What they really
need is to have their dicks tied up in leather straps and then have
needles pierced right through them."

* On the "pornography" front, Lloyd sent a very detailed post called
"How To Suck A Penis" to newsgroups accessible by children. (He did
not write it, just distributed it.)

"If Mr. Lloyd is so concerned about children being allowed on this
network, why was he contributing his own obscene material?" asks
Ken Weaverling (weave@dtcc.edu), manager of computer services at
Stanton/Wilmington Campuses of Delaware Technical & Community
College -- the site that has Whealton as a user.

For a fuller archive of Lloyd's public Usenet posts, use anonymous
FTP to hopi.dtcc.edu in directory ~ftp/interlog.

To experienced netters, these quotes from Lloyd's net.writings
aren't that shocking and are dismissed as immature attempts to
shock. They are really just his way of "turning up the heat" in this
medium.

But they become important to prove Lloyd's motives when he lays a
complaint with the chief of police.

HARROP IN ACTION

Other netters had long been complaining about Lloyd to sysadmin
Harrop. After the rape threat, Harrop asked Lloyd to tone it down.

"I informed him his account would be terminated if he kept it up,"
Harrop said. "At this point, he attempted to blackmail me. He said
he'd go to the police with obscenity charges against Interlog if he
was removed."

Reading that, Harrop said enough was enough and wrote Lloyd email
that his account was history.

Lloyd was permitted a farewell letter, which Harrop would use as
proof Lloyd had read the termination notice. It begins: "Matt, I'll let
you know that you've pissed me off. You've wasted a lot of your time
and energy on nothing. I encouraged a lot of people to use your
system. Now, they will not. I am very sorry, Matt, it sounds like you
are going to lose a lot more than just me as a user. You are also
going to lose Apple as a customer."

(When eye called Apple, a spokesperson emphatically denied that
Lloyd is an actual Apple employee. He is a subcontracted phone-tech
support staffer -- he answers questions from Mac users who forget
where the "on" switch is.)

Lloyd again made the police threat: "I might mention that I am
thinking of going to the police anyway. You are carrying highly
illegal material on your system. Pornographic and obscene material.
You are directly responsible for this."

The next day (Sept. 13), Lloyd faxed media a release entitled "Metro
Police To Investigate Obscenity Charges Against Toronto Internet
Service Provider" -- before the police had even read the complaint.

Lloyd told eye it's strictly coincidence his complaint came the day
after he was kicked off Interlog. Most netters don't buy Lloyd's story
for a second. But they worry that unless press and/or police get
savvy to how the Internet works, anyone with a grudge will be able
to do what Lloyd did.

Meanwhile, the real victim in all this is business owner Matt Harrop
and Interlog, portrayed by a gullible mainstream media outlet as
purveyors of porn to children.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Press Release

For More Information, Call:

Bruce Lloyd
Telephone: (416) 297-1742

METRO POLICE TO INVESTIGATE OBSCENITY CHARGES AGAINST
TORONTO INTERNET SERVICE PROVIDER

Metropolitan Toronto Police have been asked to investigate obscenity
charges against INTERLOG INTERNET SERVICES, and Internet service
provider operating from 1235 Bay Street, Suite 400, Toronto. (A copy of
the complaint to Metro Police is attached).

The complain stems from my discovery of obscene materials on the
computer system of Interlog. The materials include: sexually graphic
texts, pictures involving bestiality, and other pictures showing both
women and men in degrading and obscene activity. Such material would
clearly be in contravention of Canadian law.

The obscene material in question is distributed via the Internet: A
world-wide computer network, often referred to as "The Information
Superhighway". The material is received by Interlog, from computer
users around the world, and held on a hard disk drive at the Bay Street
address.

Anyone willing to pay Interlog9s membership fee of $22.50/month can
access the information. Of particular concern is the fact that
children have full access to this information -- As Interlog requires
no proof of age or identification when registering.

This will be an interesting case in law: The decision of Metro
Police and the Crown Attorney to pursue or not to pursue charges in
this matter, will have repercussions for Ontarian's with regard to what
information they will be able to access, in the future, on the
Information Superhighway. Further, the actions of the authorities in
this matter may help establish the status of Internet Service Providers
as "common carriers" (like Canada Post or Bell Canada), or not.

* * * * *

September 13, 1994

FAX

Chief William McCormack
Metropolitan Toronto Police
40 College Street
Toronto, ON

Dear Chief McCormack:

Please accept this correspondence as my official request for you to
commence an investigation into the operations and practices of Interlog
Internet Services (Interlog). Interlog is an Internet service
provider, operated from 1235 Bay Street, Suite 400, Toronto, (416)
975.2655 (voice), (416) 532.5015 (fax), (416) 515.1414 (data) my Mr.
Matt Harrop.

As you may be aware, the Internet is a world-wide computer network. At
present, approximately 20 million people have some form of access to
the Internet; and approximately 300,000 information databases are
available to users. Part of the Internet consists of Usenet. Usenet
is a forum of "newsgroups", which provide for the exchange of
information on a variety of topic specific areas. Of particular
concern to me, in relation to this complain, are the
"alt.binaries.pictures" hierarchy of newsgroups. One of these
newsgroups is "alt.pictures.binaries.tasteless". In this newsgroups, I
have found pictures which I consider to be pornographic and obscene,
and in contravention of Canadian Law.

Interlog Internet Services provides access to these newsgroups to
anyone who is willing to pay their fee of $22.50/month. The procedure
for obtaining an account with Interlog consists of mailing a cheque
along with a completed and signed registration form. I have attached
copy of the registration form, for your information. You will notice
that it is not necessary to submit identification with this form:
This, I am further concerned by the fact that children could easily
register and access the obscene material contained in
alt.binaries.pictures.tasteless.

The information contained in alt.binaries.pictures.tasteless, and other
newsgroups (including ones dealing with the Homolka publication ban,
and many sexually explicit groups), is downloaded by Mr. Harrop of
Interlog. It is then held on his computer system, and accessed by his
registered users.

Chief McCormack, at this time I ask that you undertake to investigate
the information which is contained on the computer systems of Interlog
Internet Services. Further I would expect that you would seek judicial
authorization to seize any equipment found to contain obscene
materials, and shut the service down. Lastly, I would ask that you
pursue criminal charges in this matter, should your investigations
determine that in fact Mr. Harrop is storing and transmitting obscene
materials.

Thank you for your time and attention to this matter. I will look
forward to speaking with your investigators at the earliest
opportunity, in order to provide any further information that may be
required.

Sincerely,

Bruce M. Lloyd
30 Thunder Grove, Suite 1612,
Agincourt, Ontario, M1V 4A3
(416) 297-1742

------------------------------

Date: Thu, 22 Sep 1994 15:15: 06 EDT
From: steven.horn@f1.n3409.z1.fidonet.org
Subject: File 5--Canadian BBS Sysops Plead Guilty to "Piracy"

* Copied (from: CAN_SYSLAW) by Steven Horn using timEd 1.01.g2+.

Hello All!

The following story appeared in Wednesday's The Globe and Mail Report on
Business (Sept. 21, 1994, National edition, p. 5):

"Two bulletin board operators in Montreal and Toronto recently
pleaded guilty to the illegal distribution of software and were fined
a total of $22,500.

'This sends an important message that software piracy in Canada
will not be tolerated -- at any level,' said Frank Clegg, president
of the Canadian Alliance Against Software Theft, which announced the
convictions yesterday.

In August, the RCMP raided a Montreal bulletin board system (BBS)
known as 90 North, revealing the distribution of unlicenced software
by Lotus, Microsoft, Novell and Novell/WordPerfect Applications
Group. Its operator, Michael Solomon, was fined $20,000.

In September, Sergio Arana, operator of Toronto-based Legion of
Death, was fined $2,500 after investigators infiltrated his BBS and
downloaded sufficient software to confirm illegal activity."

There's nothing I can add.

------------------------------

Date: Thu, 22 Sep 94 14:25 CDT
From: rejones@MHGJRS.MHG.COM
Subject: File 6--PHRACK hardcopies available from SotMESC / GCMS

Press Release

The SotMESC is presenting three volumes of the collected
works from Phrack in a bounded treasury. These collectors
items can be obtained from the non-profit SotMESC organization.
Phrack 1-42 (c) SotMESC are being offered to the public to
fund our organization in protecting network liberties, freedom
and privacy.

The Phrack volumes and other assorted fundings we are
publishing can be found in our current catalog available for
$1 via Smail at: SotMESC, Box 573, Long Beach, Ms 39560.

More information on the SotMESC can be obtained by
pointed to http://www.phantom.com/~king with Mosaic.

------------------------------

Date: Sat, 24 Sep 1994 12:47:15 -0500
From: "William B. Collins" <bcollins@FALCON.CC.UKANS.EDU>
Subject: File 7--ACLU Gopher

Point your gophers to aclu.org:6601/11/ for access to the ACLU Free
Reading Room. The following document is from the ACLU Gopher. It is also
available through the World Wide Web.

=======================
THE ACLU FREE READING ROOM

Welcome to the American Civil Liberties Union Free Reading Room,
a publications, software, and information resource of the
nation's oldest and largest defender of the principles set forth
in the Bill of Rights.

The ACLU Free Reading Room makes available to users of the
internet a growing collection of our publications and information
resources. Currently, the collection includes our basic line
of publications on issues of high public interest; the current issue
of our membership newsletter, Civil Liberties; a growing collection of
recent public policy reports and action guides; Congressional voting
records for the 103rd Congress; and an archive of news releases from the
National Office.

The collection will grow to include calls to action on legislative
issues, testimony delivered to Congress, and a collection of ACLU legal
briefs submitted in important Supreme Court cases.

In the future, we plan to develop a variety of electronic
publications, including an adaptation of our newsletter and other
special interest mailing lists. Please watch this space for
further information.

ADMINISTRATIVE INFORMATION

The ACLU Free Reading Room is a project of the Public Education
Department of the National Office of the American Civil Liberties
Union. Programming services are provided by The Pipeline
Network, an Internet access provider based in New York.

The ACLU Free Reading Room contains publications and other
materials from the ACLU in a gopher and ftp accessible resource,
and is a read-only site. At this time, we recommend that
follow-ups and public discussion of the materials at this site
take place in the USENET news group alt.society.civil-liberties,
alt.censorship or other newsgroups or bulletin boards where
appropriate. Comments and questions about this resource may be
directed to infoaclu@aclu.org.

Unless otherwise indicated, documents in this resource may be
circulated in whole with acknowledgement, and may of course be
quoted under fair use guidelines. Print reproduction other than
for personal use should be requested from infoaclu@aclu.org, or
by mail at this address: American Civil Liberties Union, Department of
Public Education, 132 West 43rd Street, New York, New York 10036

Consulting this resource is not a means of obtaining legal advice
or representation from the ACLU. For information about seeking
assistance from the ACLU, consult section 10 of this gopher. At this
time, we do not have the capacity to forward electronic mail to our state
offices, who are responsible for reviewing legal complaints
arising in their areas and offering legal assistance. Therefore,
requests for legal assistance sent to infoaclu@aclu.org cannot be
accepted.

------------------------------

Date: Mon, 26 Sep 1994 12:17:02 CDT
From: Vigdor Schreibman - FINS <fins@ACCESS.DIGEX.NET>
Subject: File 8--Telecommunication Reform Bill (S. 1822) DEAD!

FINS SPECIAL REPORT September 23, 1994

S. 1822 DEAD!
Hollings Throws In The Towel

Washington, DC, Sept 23, 1994--Sen. Ernest F. Hollings (D-SC), announced
today that "we will be unable to pass comprehensive telecommunications
reform legislation this Congress." Hollings noted that "only one sector
of the industry continues to oppose the bill . . . the telephone
companies, and especially, the RBOCs." Moreover, Hollings listed a
serious of reasons that would make passage of the bill "impossible this
Congress." This included (among others reasons), the fact that "the
RBOCs have violated the terms of the agreement they have reached with
me and the other members of the committee on long distance" as well as
an ultimatum delivered by Sen. Dole. Dole informed the Committee
yesterday that a serious of revisions of the bill, were required,
which were "non-negotiable." The provisions would have "substantially
deregulated the industry" according to Hollings.

------------------------------

Date: Thu, 13 Aug 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 9--Cu Digest Header Information (unchanged since 10 Sept 1994)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #6.85
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT